-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathindex.xml
More file actions
170 lines (133 loc) · 9.09 KB
/
index.xml
File metadata and controls
170 lines (133 loc) · 9.09 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>BitsForEveryone</title>
<link>https://www.bitsforeveryone.com/</link>
<description>Recent content on BitsForEveryone</description>
<generator>Hugo -- gohugo.io</generator>
<lastBuildDate>Tue, 21 Aug 2018 10:34:56 -0400</lastBuildDate>
<atom:link href="https://www.bitsforeveryone.com/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Tryouts 2018</title>
<link>https://www.bitsforeveryone.com/writeup/tryouts_2018/signup/</link>
<pubDate>Tue, 21 Aug 2018 10:34:56 -0400</pubDate>
<guid>https://www.bitsforeveryone.com/writeup/tryouts_2018/signup/</guid>
<description><h2 id="interested-in-the-cadet-competitive-cyber-team-c3t">Interested in the Cadet Competitive Cyber Team (C3T)?</h2>
<p><strong>Sign up for tryouts information <a href="https://docs.google.com/forms/d/e/1FAIpQLSfRefx-3GItxg0ZA0bKus3T0At_S_QerJgD7jnE6S-BsV1ATQ/viewform?usp=sf_link">here</a>.</strong></p>
<p></p></description>
</item>
<item>
<title>Math Class</title>
<link>https://www.bitsforeveryone.com/writeup/rc3ctf_2017/math_class/</link>
<pubDate>Fri, 24 Nov 2017 08:17:37 -0500</pubDate>
<guid>https://www.bitsforeveryone.com/writeup/rc3ctf_2017/math_class/</guid>
<description><h4 id="rc3-ctf-2017-400-points-crypto">RC3 CTF 2017 - 400 points - Crypto</h4></description>
</item>
<item>
<title>Realism</title>
<link>https://www.bitsforeveryone.com/writeup/csaw_2017/realism/</link>
<pubDate>Wed, 27 Sep 2017 18:03:59 -0400</pubDate>
<guid>https://www.bitsforeveryone.com/writeup/csaw_2017/realism/</guid>
<description><h4 id="csaw-ctf-2017-300-points-reverse-engineering">CSAW CTF 2017 - 300 points - Reverse Engineering</h4>
<p></p></description>
</item>
<item>
<title>All Writeups</title>
<link>https://www.bitsforeveryone.com/page/all/</link>
<pubDate>Wed, 20 Sep 2017 09:00:35 -0400</pubDate>
<guid>https://www.bitsforeveryone.com/page/all/</guid>
<description></description>
</item>
<item>
<title>About</title>
<link>https://www.bitsforeveryone.com/page/about/</link>
<pubDate>Tue, 19 Sep 2017 14:45:39 -0400</pubDate>
<guid>https://www.bitsforeveryone.com/page/about/</guid>
<description>Who: We are BitsForEveryone.
What: We play CTFs.
These are our writeups and projects.
Why: For flags and country.</description>
</item>
<item>
<title>tableEZ</title>
<link>https://www.bitsforeveryone.com/writeup/csaw_2017/tableez/</link>
<pubDate>Tue, 19 Sep 2017 14:14:20 -0400</pubDate>
<guid>https://www.bitsforeveryone.com/writeup/csaw_2017/tableez/</guid>
<description><h4 id="csaw-ctf-2017-100-points-reverse-engineering">CSAW CTF 2017 - 100 points - Reverse Engineering</h4></description>
</item>
<item>
<title>no_mo_flo</title>
<link>https://www.bitsforeveryone.com/writeup/plaid_2017/no_mo_flo/</link>
<pubDate>Sun, 23 Apr 2017 09:36:27 -0400</pubDate>
<guid>https://www.bitsforeveryone.com/writeup/plaid_2017/no_mo_flo/</guid>
<description><h4 id="plaidctf-2017-125-points-reverse-engineering">PlaidCTF 2017 - 125 points - Reverse Engineering</h4></description>
</item>
<item>
<title>Old_but_gold</title>
<link>https://www.bitsforeveryone.com/writeup/ekoparty_2017/old_but_gold/</link>
<pubDate>Sun, 30 Oct 2016 17:11:41 -0400</pubDate>
<guid>https://www.bitsforeveryone.com/writeup/ekoparty_2017/old_but_gold/</guid>
<description><h4 id="ekoparty-2016-ctf-250-points-misc">EKOParty 2016 CTF - 250 points - Misc</h4></description>
</item>
<item>
<title>grapefruit</title>
<link>https://www.bitsforeveryone.com/project/grapefruit/</link>
<pubDate>Wed, 31 Aug 2016 14:46:09 -0400</pubDate>
<guid>https://www.bitsforeveryone.com/project/grapefruit/</guid>
<description><p><code>grapefruit</code> is a suite of tools written by a few members of the team for use in
an Attack-Defend style CTF. The source is available on <a href="https://github.com/bitsforeveryone/grapefruit">Github</a>.</p>
<p></p></description>
</item>
<item>
<title>Flag Level Four</title>
<link>https://www.bitsforeveryone.com/flags/army_hacker_team_got_root/</link>
<pubDate>Thu, 01 Jan 1970 03:13:37 -1337</pubDate>
<guid>https://www.bitsforeveryone.com/flags/army_hacker_team_got_root/</guid>
<description>Welcome Thanks for your interest in the USMA Cadet Competitive Cyber Team
Flag Four: army_hacker_team_got_root: Wow, you found the final flag. Well done. In cybersecurity competitions called capture-the-flag, aspring or full fledge hackers attempt to recover strings of characters called flags. These flags represent critical data that is intended to be protected by the system. It could be passwords, credit card numbers, social security numbers, or even the full schematics of a DS-1 Orbital Battle Station.</description>
</item>
<item>
<title>Flag Level One</title>
<link>https://www.bitsforeveryone.com/flags/p0st3r_o_awe50m3nezz/</link>
<pubDate>Thu, 01 Jan 1970 03:13:37 -1337</pubDate>
<guid>https://www.bitsforeveryone.com/flags/p0st3r_o_awe50m3nezz/</guid>
<description>Welcome Thanks for your interest in the USMA Cadet Competitive Cyber Team
Flag One: p0st3r_o_awe50m3nezz Whoah, first flag found. Well done. In cybersecurity competitions called capture-the-flag, aspring or full fledge hackers attempt to recover strings of characters called flags. These flags represent critical data that is intended to be protected by the system. It could be passwords, credit card numbers, social security numbers, or even the full schematics of a DS-1 Orbital Battle Station.</description>
</item>
<item>
<title>Flag Level Three</title>
<link>https://www.bitsforeveryone.com/flags/morsecodefasterthantexting/</link>
<pubDate>Thu, 01 Jan 1970 03:13:37 -1337</pubDate>
<guid>https://www.bitsforeveryone.com/flags/morsecodefasterthantexting/</guid>
<description>Welcome Thanks for your interest in the USMA Cadet Competitive Cyber Team
Flag Three: morsecodefasterthantexting Wow, you found the third flag, only one more to go. Well done. In cybersecurity competitions called capture-the-flag, aspring or full fledge hackers attempt to recover strings of characters called flags. These flags represent critical data that is intended to be protected by the system. It could be passwords, credit card numbers, social security numbers, or even the full schematics of a DS-1 Orbital Battle Station.</description>
</item>
<item>
<title>Flag Level Two</title>
<link>https://www.bitsforeveryone.com/flags/go_army_cyber_hack_everyonez/</link>
<pubDate>Thu, 01 Jan 1970 03:13:37 -1337</pubDate>
<guid>https://www.bitsforeveryone.com/flags/go_army_cyber_hack_everyonez/</guid>
<description>Welcome Thanks for your interest in the USMA Cadet Competitive Cyber Team
Flag Two: go_army_cyber_hack_everyonez Wow, you found the second flag. Well done. In cybersecurity competitions called capture-the-flag, aspring or full fledge hackers attempt to recover strings of characters called flags. These flags represent critical data that is intended to be protected by the system. It could be passwords, credit card numbers, social security numbers, or even the full schematics of a DS-1 Orbital Battle Station.</description>
</item>
<item>
<title>Flag Level Zero</title>
<link>https://www.bitsforeveryone.com/flags/flag_i_found/</link>
<pubDate>Thu, 01 Jan 1970 03:13:37 -1337</pubDate>
<guid>https://www.bitsforeveryone.com/flags/flag_i_found/</guid>
<description>What are you doing? You don&rsquo;t follow instructions very well do you.
Flag Zero: flag_i_found I told you that was not a real flag, but no you had to go and try it out. Well at least you read and sort of followed directions.
Here is your consolation prize!
Ha!</description>
</item>
<item>
<title>Poster</title>
<link>https://www.bitsforeveryone.com/poster/</link>
<pubDate>Thu, 01 Jan 1970 03:13:37 -1337</pubDate>
<guid>https://www.bitsforeveryone.com/poster/</guid>
<description>Welcome Thanks for your interest in the USMA Cadet Competitive Cyber Team
Poster Here is our team poster that you maybe saw at CYCON-US or inside of Thayer Hall. If you recovered any flags from the poster, you can use those flags as URLs on this site under the flags directory for more leet hacker points.
For instance if you found the flag c3t{flag_i_found} then you would go to http://www.</description>
</item>
</channel>
</rss>